Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.Du kan altid afmelde dig igen.
Many companies have embraced the benefits of cloud computing because of its pay-per-use cost model and the elasticity of resources that it provides. But from a data confidentiality and integrity viewpoint, moving a company's IT systems to a public cloud poses some challenges. System protection is often based on perimeter security, but in the cloud, the company's systems run on the cloud provider's hardware and coexist with software from both the provider and other cloud service consumers. Simply put, the cloud blurs the formerly clear separation between the trusted inside and the untrusted outside. Malicious insiders represent a particularly significant concern for security in the cloud, as cloud operators and system administrators are unseen, unknown, and not onsite. Confidential data such as passwords, cryptographic keys, or files are just a few commands away from access by a malicious or incompetent system administrator. This ReadyNote addresses the threat of malicious insiders in the context of clouds that provide the infrastructure as a service (IaaS) model, in the sense of clouds where consumers can run virtual machines. The text is complementary to several guidelines and reports on cloud security that have been published by organizations like the National Institute of Standards and Technology (NIST), the European Network and Information Security Agency (ENISA), and the Cloud Security Alliance.
Publication is a key element of science and engineering, as it not only spreads new ideas and practices but also sustains technical communities. This ReadyNote is intended to help new authors--engineers and scientists who are just beginning to write and publish--prepare technical ideas for publication and protect the publications that contain those ideas. It will also be useful in guiding more experienced authors through commonly misunderstood copyright issues as well as procedures specific to the Computer Society and its parent organization, the Institute of Electrical and Electronic Engineers. There are many ways of approaching the problem of writing technical articles, publishing information, and protecting ideas. This concise guide presents a few strategies that are simple to use and have been successful in the past.
In his new book, David Alan Grier tells the stories that technical papers omit. Moving beyond the stereotypes of nerds and social misfits, The Company We Keep explores the community of people who build, use, and govern modern computing technology. The essays are both insightful and intimate, showing the impact of technology and the human character behind it. This book examines the development of digital technology by describing how this technology affects the communities that build, adapt, govern, and dispose of it. Centering on Washington, DC, many of the essays use Washington not only as an example of a community but also as a metaphor for how computing technology has connected individuals more closely and more firmly to the centers of political power, economic power, social power, and cultural power. Based on the author's popular column "The Known World" in Computer magazine.
"The nexus of computer science and cognitive science will remain a fruitful area for research and reflection. Humans, computers, and their context form a trinity that will require the sort of insight that these essays embody. If we are to realize the promise of intelligent systems in all their forms, we will need the concepts, methods, and reflections contained in this book." --Nigel Shadbolt, University of Southampton, from the Foreword The notion of Human-Centered Computing (HCC) was introduced as a named program at the NASA-Ames Research Center. Both the evolution of HCC and its current theoretical and research foundations are laid out in the essays that are compiled into this volume. HCC, from this perspective, has the goal of creating technologies that amplify and extend human perceptual, cognitive, and collaborative capabilities. With contributions from more than three dozen coauthors, these 40 essays from the Human-Centered Computing department of IEEE Intelligent Systems lay out and clarify the principles of HCC.
Extending the work done in the authors' recent book, TCP/IP Architecture, Design, and Implementation in Linux, this concise and practical guide covers the multiple functionalities of IPv6 Neighbor Discovery for Linux kernel 2.6.34, including address resolution using Neighbor Solicitation and Neighbor Advertisement as well as the correct formatting for Neighbor Solicitation and Neighbor Advertisement. Developers, aspirants, and students seeking to understand the implementation of the IPv6 Neighbor Discovery address resolution feature in Linux in comparison with the equivalent protocol in IPv4 will find this to be an essential reference.
Any way you look at it, software defects are expensive, from rework costs all the way to potential legal liability issues. In this concise volume, Robert McCann presents a business model describing a general approach to monitoring and analyzing rework costs. Once understood, this model provides explicit formulae to support an understanding of cost-benefit analysis results. Appropriate use of this model can help an organization to be more competitive in the market by growing more effective teams. It can help an organization place its products into the market quickly and cheaply while delivering products that work and sell well. It can also make it easier to achieve high ratings on ISO-9000 and SEI/CMMI process assessments, while lowering assessment costs.
There is a great deal of difference between feeling empathy for those whose human rights are being violated around the world and actually doing something about it. This memoir, written by the Vice-Chair Computer Science (CS) of the Committee of Concerned Scientists (CCS), 1962-present, and Vice-Chair of the Committee on Scientific Freedom and Human Rights (CSFHR) of the ACM, 1980-1989, is a first-hand account of computer scientists working with numerous other constituencies to safeguard or advance the human rights of scientists throughout the world. Drawing from the author's considerable archives from the period, Scientific Freedom and Human Rights is a treasure trove of historical information about a critical -- and relatively unsung -- human rights campaign, its successes and heartbreaking challenges, and possible lessons to be applied to future human rights campaigns. "The solidarity of the global scientific community was especially important in giving moral support to the intellectual leaders of the struggle for Soviet Jewry, helping them to continue their scientific activity even in a time of persecution. Their activism also helped to link scientific cooperation with the Soviet Union with freedom within the Soviet Union.... You will read these stories and see the support given many scientists throughout the world in this book." -- Natan Sharansky, Jewish Agency Chairman of the Executive "It is not very often that solidarity among scientists is brought to the public eye, and it is certainly not common for people outside science to associate scientists with heroic struggles for human rights, freedom, and dignity. Jack Minker's new book will change this perception." -- Professor Judea Pearl, University of California at Los Angeles
More than a century ago Herman Hollerith pioneered punch card tabulation technology. In 1911 his enterprise became the centerpiece of a new corporation (renamed in the 1920s), International Business Machines (IBM). Over the past century IBM has transformed how we record, calculate, and process information -- forever changing business, science, engineering, government, and leisure. Far more than any other firm, IBM created the IT revolution. This unique volume brings together fascinating memoirs of key IBM engineers and managers of the past 100 years -- from Walter Jones, who started as a sales engineer in 1912 and rose through the ranks for three decades, to Cuthbert Hurd, James Birkenstock, Bob Evans, John Backus, Watts Humphrey, and others who led IBM to supremacy in digital computing and software. It details punch card tabulation, IBM's entrance into computing, and the transformative IBM hardware (IBM 650, IBM 1401, System/360) and software (FORTRAN, SABRE, IMS) that changed the world. The IBM Century contains an IBM timeline, the most comprehensive IBM annotated bibliography to date, and a new introductory essay that characterizes IBM's 100-year history and contextualizes each of the memoirs.
In the Guide to the Software Engineering Body of Knowledge (SWEBOK(R) Guide), the IEEE Computer Society establishes a baseline for the body of knowledge for the field of software engineering, and the work supports the Society's responsibility to promote the advancement of both theory and practice in this field. It should be noted that the Guide does not purport to define the body of knowledge but rather to serve as a compendium and guide to the knowledge that has been developing and evolving over the past four decades. Now in Version 3.0, the Guide's 15 knowledge areas summarize generally accepted topics and list references for detailed information. The editors for Version 3.0 of the SWEBOK(R) Guide are Pierre Bourque (École de technologie supérieure (ÉTS), Université du Québec) and Richard E. (Dick) Fairley (Software and Systems Engineering Associates (S2EA)).
This publication explores two overlapping niche sourcing markets: rural sourcing and impact sourcing. Rural sourcing is the practice of locating information technology outsourcing (ITO) or business process outsourcing (BPO) delivery centers in low-cost, non-urban areas. Impact sourcing is the practice of hiring and training marginalized people in ITO or BPO services who normally would have few opportunities for good employment. Rural sourcing and impact sourcing intersect when marginalized people in rural areas are hired, trained, and employed in ITO or BPO businesses. Based on 62 interviews with providers and clients in the US, Israel, India, and China, this concise study discusses challenges, best practices, and lessons for providers seeking to build ITO and BPO capabilities in remote areas or with unique populations and for clients seeking to buy their services.
A cooperative learning approach to involving students with diverse backgrounds, an Affinity Research Group (ARG) is an effective means of ensuring student engagement. Through a structured team approach, students learn how to conduct scholarly research, lead effective team discussions, kick off a research project, and much more. The ARG model, researched and documented with the support of the National Science Foundation, delivered results at the University of Texas, El Paso. During an evaluation of 175 group members over five years: * 78% of members participating in undergraduate research came from underrepresented student groups; * 30% of undergraduates continued to graduate school; * 100 papers have been published with student coauthors. Now, with this practical handbook, supplemented by author workshops nationwide, the success of the Affinity Research Group model can spread to all sorts of programs in a wide range of institutions.
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.